[QILIN] – Ransomware Victim: Tiger Communications
![[QILIN] - Ransomware Victim: Tiger Communications 1 image](https://www.redpacketsecurity.com/wp-content/uploads/2024/09/image.png)
Ransomware Group: QILIN
VICTIM NAME: Tiger Communications
NOTE: No files or stolen information are [exfiltrated/downloaded/taken/hosted/seen/reposted/disclosed] by RedPacket Security. Any legal issues relating to the content of the files should be directed at the attackers directly, not RedPacket Security. This blog is simply posting an editorial news post informing that a company has fallen victim to a ransomware attack. RedPacket Security is in no way affiliated or aligned with any ransomware threat actors or groups and will not host infringing content. The information on this page is fully automated and redacted whilst being scraped directly from the QILIN Onion Dark Web Tor Blog page.
AI Generated Summary of the Ransomware Leak Page
The leak page pertains to Tiger Communications, a company operating within the telecommunication industry based in the United Kingdom. The disclosure occurred on July 18, 2025, as highlighted by the discovery timestamp. The attackers, identified as part of the Qilin group, have threatened to publish sensitive files if the victim does not make contact by July 25, 2025. The available data indicates that the compromised data includes a directory of customers and contractual information, though specific contents have not been fully released at this time. No explicit personal identifiers or confidential employee information are included in the current leak details.
The threat involves the imminent publication of the company’s files unless ransom demands are met. The leak page mentions a full directory of files of interest, potentially containing customer records and contractual documentation relevant to the company’s operations. It is also noted that the breach was discovered and logged on July 18, 2025, and the attackers have not yet released graphic or harmful content. No screenshots or images are available or show any visual proof of the compromised data. The incident underscores the importance of cybersecurity measures in telecommunication services and demonstrates the ongoing threat landscape posed by organized cybercriminal groups targeting corporate infrastructure.
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below
To keep up to date follow us on the below channels.